International Business Machines Corporation
BLOCK-BASED ANOMALY DETECTION
Last updated:
Abstract:
A plurality of blocks of a first storage device are monitored. The first storage device is related to a computer system. A subset of blocks of the plurality a compared to a first storage signature of the first storage device. Based on the comparing of the subset of blocks to the first storage signature, a security anomaly is determined on the computer system. In response to the security anomaly, a security action is performed. The security action is related to the computer system.
Status:
Application
Type:
Utility
Filling date:
10 Jul 2020
Issue date:
13 Jan 2022